NGA

No network, no problem: NGA’s app provides mapping without a connection

The National Geospatial-Intelligence Agency’s Disconnected Interactive Content Explorer app gives users interactive maps even when offline -- and the code has been open-sourced for use by other agencies.

Behind the iOS app advantage

Behind the iOS app advantage

The curious folks at DigitalGov asked an expert why there are more government apps developed for iOS.

Are state websites up to the mobile challenge?

Are state websites up to the mobile challenge?

A look at which state websites are falling short on Google’s new mobile-friendly rankings and why.

Governments hitch a ride on social sharing apps

Governments hitch a ride on social sharing apps

Waze and Uber partner with local governments to share information, which benefits drivers, riders and city planners.

What mobile means for your site

What mobile means for your site's search ranking

With Google's PageRank putting new emphasis on mobile friendliness, agencies will feel more pressure to speed the move to mobile.

Spike turns smartphones into remote-measuring tools

Spike turns smartphones into remote-measuring tools

ikeGPS Spike offers emergency-response managers a new mobile tool for making rapid in-the-field measurements that can easily be integrated into responders’ databases.

Bodyprint uses ear scans for authentication

Unlock your phone with your ear

Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.

FirstNet releases draft RFP

FirstNet releases draft RFP

The First Responder Network Authority Board released a draft RFP for the construction, operation, maintenance and improvement of the nationwide public safety broadband network.

rugged tablets in the field

What to look for in rugged tech

Rugged tablets offer a secure and cost-effective solution for employees in the field -- but only if the IT staff chooses carefully.

Ebola smartphone app

CDC announces smartphone coaching app for Ebola workers

The animated, speech-enabled, step-by-step mobile coaching helps healthcare workers follow directions for putting on and removing personal protective equipment in accordance with CDC guidelines.

mWater app for monitoring water purity

NASA tech inspires open data infrastructure for water monitoring

Technology developed for testing water purity on the International Space Station is being remade into a simple, low-cost mobile app for evaluating water safety here on Earth.

Rescue workers use apps to help save lives

Rescue workers, hospital staffers and patients themselves are using mobile apps to improve responses to health emergencies.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

  • Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

  • Ensuring Application Security in Mobile Device Environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks.